Re: [PATCH v3 19/19] arm64: lto: Strengthen READ_ONCE() to acquire when CONFIG_LTO=y

2020-07-28 Thread Pavel Machek
On Fri 2020-07-10 17:52:03, Will Deacon wrote: > When building with LTO, there is an increased risk of the compiler > converting an address dependency headed by a READ_ONCE() invocation > into a control dependency and consequently allowing for harmful > reordering by the CPU. > > Ensure that such

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-12 Thread Pavel Machek
On Tue 2020-07-07 12:00:41, Colm MacCarthaigh wrote: > > > On 7 Jul 2020, at 9:37, Pavel Machek wrote: > > Please go through the thread and try to understand it. > > > > You'd need syscalls per get_randomness(), not per migration. > > I think one ch

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-07 Thread Pavel Machek
Hi! > > > > You can do it seqlock-style, kind of - you reserve the first byte of > > > > the page or so as a "is this page initialized" marker, and after every > > > > read from the page, you do a compiler barrier and check whether that > > > > byte has been cleared. > > > > > > This is certainly

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-07 Thread Pavel Machek
Hi! > > > > This patch adds logic to the kernel power code to zero out contents of > > > > all MADV_WIPEONSUSPEND VMAs present in the system during its transition > > > > to any suspend state equal or greater/deeper than Suspend-to-memory, > > > > known as S3. > > > > > > How does the application

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-04 Thread Pavel Machek
Hi! > > > Cryptographic libraries carry pseudo random number generators to > > > quickly provide randomness when needed. If such a random pool gets > > > cloned, secrets may get revealed, as the same random number may get > > > used multiple times. For fork, this was fixed using the WIPEONFORK > >

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-03 Thread Pavel Machek
Hi! > Cryptographic libraries carry pseudo random number generators to > quickly provide randomness when needed. If such a random pool gets > cloned, secrets may get revealed, as the same random number may get > used multiple times. For fork, this was fixed using the WIPEONFORK > madvise flag [1].

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-03 Thread Pavel Machek
On Fri 2020-07-03 14:17:50, Rafael J. Wysocki wrote: > On Fri, Jul 3, 2020 at 1:30 PM Michal Hocko wrote: > > > > On Fri 03-07-20 10:34:09, Catangiu, Adrian Costin wrote: > > > This patch adds logic to the kernel power code to zero out contents of > > > all MADV_WIPEONSUSPEND VMAs present in the s

Re: [RFC]: mm,power: introduce MADV_WIPEONSUSPEND

2020-07-03 Thread Pavel Machek
On Fri 2020-07-03 15:29:22, Jann Horn wrote: > On Fri, Jul 3, 2020 at 1:30 PM Michal Hocko wrote: > > On Fri 03-07-20 10:34:09, Catangiu, Adrian Costin wrote: > > > This patch adds logic to the kernel power code to zero out contents of > > > all MADV_WIPEONSUSPEND VMAs present in the system during

Re: [PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support

2018-05-29 Thread Pavel Machek
On Fri 2018-05-25 10:00:04, Thomas Garnier wrote: > On Fri, May 25, 2018 at 2:14 AM Pavel Machek wrote: > > > On Thu 2018-05-24 09:35:42, Thomas Garnier wrote: > > > On Thu, May 24, 2018 at 4:03 AM Pavel Machek wrote: > > > > > > > On Wed

Re: [PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support

2018-05-25 Thread Pavel Machek
On Thu 2018-05-24 09:35:42, Thomas Garnier wrote: > On Thu, May 24, 2018 at 4:03 AM Pavel Machek wrote: > > > On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > > > Change the assembly code to use only relative references of symbols for > the > >

Re: [PATCH v3 11/27] x86/power/64: Adapt assembly for PIE support

2018-05-25 Thread Pavel Machek
On Thu 2018-05-24 09:37:20, Thomas Garnier wrote: > On Thu, May 24, 2018 at 4:04 AM Pavel Machek wrote: > > > On Wed 2018-05-23 12:54:05, Thomas Garnier wrote: > > > Change the assembly code to use only relative references of symbols for > the > >

Re: [PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support

2018-05-24 Thread Pavel Machek
On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > Change the assembly code to use only relative references of symbols for the > kernel to be PIE compatible. > > Position Independent Executable (PIE) support will allow to extended the > KASLR randomization range below the -2G memory limit. What

Re: [PATCH v3 11/27] x86/power/64: Adapt assembly for PIE support

2018-05-24 Thread Pavel Machek
On Wed 2018-05-23 12:54:05, Thomas Garnier wrote: > Change the assembly code to use only relative references of symbols for the > kernel to be PIE compatible. > > Position Independent Executable (PIE) support will allow to extended the > KASLR randomization range below the -2G memory limit. > > S

Re: [PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization

2018-03-15 Thread Pavel Machek
Hi! > These patches make the changes necessary to build the kernel as Position > Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below > the top 2G of the virtual address space. It allows to optionally extend the > KASLR randomization range from 1G to 3G. Would you explain w

Re: [PATCH v2 34/37] docs: fix locations of several documents that got moved

2016-11-02 Thread Pavel Machek
Hi! > > Dunno, but kernel-parameters.txt was already quite long... for a file > > that is referenced quite often. Adding admin-guide/ into the path does > > not really help. > > The big string name starts with Documentation/ :) There are some discussions > about changing it to doc/ (or docs/). A

Re: [PATCH v2 34/37] docs: fix locations of several documents that got moved

2016-10-19 Thread Pavel Machek
Hi! > --- a/Documentation/ABI/testing/sysfs-kernel-slab > +++ b/Documentation/ABI/testing/sysfs-kernel-slab > @@ -347,7 +347,7 @@ Description: > because of fragmentation, SLUB will retry with the minimum order > possible depending on its characteristics. >

Re: [PATCH 0/5] Enable Drivers for Intel MIC X100 Coprocessors.

2013-08-15 Thread Pavel Machek
Hi! > > > Since it is a PCIe card, it does not have the ability to host hardware > > > devices for networking, storage and console. We provide these devices > > > on X100 coprocessors thus enabling a self-bootable equivalent environment > > > for applications. A key benefit of our solution is that

Re: [PATCH 0/5] Enable Drivers for Intel MIC X100 Coprocessors.

2013-08-13 Thread Pavel Machek
Hi! > Since it is a PCIe card, it does not have the ability to host hardware > devices for networking, storage and console. We provide these devices > on X100 coprocessors thus enabling a self-bootable equivalent environment > for applications. A key benefit of our solution is that it leverages >

Re: [PATCH 16/16 v6] PCI: document the new PCI boot parameters

2008-11-09 Thread Pavel Machek
Hi! > >>> If we do resource rebalance after system is up, do you think there is any > >>> side effect or impact to other subsystem other than PCI (e.g. MTRR)? > >> I don't think so. > >>> I haven't had much thinking on the dynamical resource rebalance. If you > >>> have any idea about this, can

Re: [PATCH 8/8 v4] PCI: document the changes

2008-10-17 Thread Pavel Machek
Hi! > Create how-to for SR-IOV user and device driver developer. > > Signed-off-by: Yu Zhao <[EMAIL PROTECTED]> > +1.1 What is SR-IOV > + > +Single Root I/O Virtualization (SR-IOV) is a PCI Express Extended > +capability which makes one physical device appear as multiple virtual > +devices. The

Re: [PATCH 4/8] unify paravirt parts of system.h

2007-12-17 Thread Pavel Machek
On Mon 2007-12-17 01:27:29, Rafael J. Wysocki wrote: > On Saturday, 15 of December 2007, Ingo Molnar wrote: > > > > * Pavel Machek <[EMAIL PROTECTED]> wrote: > > > > > > Linux never uses that register. The only user is suspend > > > > s

Re: [PATCH 4/8] unify paravirt parts of system.h

2007-12-17 Thread Pavel Machek
On Sat 2007-12-15 14:26:38, Andi Kleen wrote: > > It probably is safe to remove... but we currently support '2.8.95 > > kernel loads/resumes 2.6.24 image'... which would break if 2.8 uses > > cr8. > > No it won't. 2.8 would just restore some random useless value. Restoring random value seems wron

Re: [PATCH 4/8] unify paravirt parts of system.h

2007-12-17 Thread Pavel Machek
On Tue 2007-12-04 20:34:32, Andi Kleen wrote: > On Tue, Dec 04, 2007 at 09:18:33PM +0200, Avi Kivity wrote: > > Glauber de Oliveira Costa wrote: > >> This patch moves the i386 control registers manipulation functions, > >> wbinvd, and clts functions to system.h. They are essentially the same > >> a

Re: [PATCH] Add I/O hypercalls for i386 paravirt

2007-08-24 Thread Pavel Machek
Hi! > >>In general, I/O in a virtual guest is subject to > >>performance problems. The I/O can not be completed > >>physically, but must be virtualized. This > >>means trapping and decoding port I/O instructions from > >>the guest OS. Not only is the trap for a #GP > >>heavyweight, both in th